Theory Level 4 HNS COC

Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

Hardware and Networking Service Model COC level IV 2015

1. Small business owners develop and use operating procedures so tasks are
performed in a(n)---way
A. Innovative
B. Imprecise
C. Standard
D. Diverse
2. Your company has one main office and four branch offices. The main office
contains a standard primary DNS zone named adatum.com Each branch office
contains a copy of the adatuma.com zone. When records are added to the
adatuma.com zone, you discover that it takes up to one hour before that changes
replicate to each zone in the branch office you need to minimize the amount of
time it takes for the records to be in the branch office .what should you do?
A. On the DNS servers in the branch office , configure the zone Aging
/scavenging properties
B. On the DNS server in the main office , configure the zone Aging/scavenging
properties
C. On the DNS servers in the branch offices ,configure the Notify settings
D. On the DNS server in the main office , configure the Notify settings
3. Which of the following protocol used port 443 and 80 respectively
A. DHTML
B. XHTML
C. HTTP and HTTPS
D. HTTPS and HTTP
4. Network layer firewall has two sub categories as
A. Frame firewall and packets firewall
B. None of the mentioned
C. State full and stateless firewall
D. Bit oriented firewall and byte oriented firewall
5. The most frequently used framework for obtaining continuous improvement is ---
---
A. The plan—do—check-act cycle
B. The quality circle
C. The cause and effect process
D. Quality function deployment
6. You have a domain controller that runs windows server 2008 R2 and is
configured as aDNS server. you need to record all in bound DNS queries to
configure in the DNS manager console?
A. Enable automatic testing for recursive queries.
B. Enable automatic testing for simple queries.
C. Enable debugs logging
D. Configure event logging to log errors and warnings.
7. Which of the following elements is required to do after successfully installation
on DNS?
A. WINDOWES 2000 clients configuration
B. Static IP address configuration
C. Dynamic IP address configuration
1
Prepared by Belayneh Tadele mob. 0921777735
Hardware and Networking Service Model COC level IV 2015

D. Active directory configuration


8. A new corporation needs data network that must meet certain requirement. The
network must provide a low cost connection to sales people dispersed over large
geographical area. Which type of WAN infrastructure would meets the
requirements
A. Private infrastructure
B. Dedicated
C. Public infrastructure
D. Satellite
9. What do business employees often need to do before they are able to write
proposals ?
A. Contact the customer
B. Evaluate technical skills
C. Analyze personal skills
D. Research the problem
10. The file transfer protocol built on ------------------
A. Service oriented architecture
B. Client server architecture
C. Data centric architecture
D. File centered architecture
11. HTTP client requests by establishing a---------------connection to a particular port
on the server
A. File transfer protocol
B. User datagram protocol
C. Transmission control protocol
D. Broader gateway protocol
12. In which layer of the hierarchical enterprise LAN design model would POE(power
over Ethernet) for VOIP phones be considered ?
A. physical
B. core
C. Distribution
D. Access
13. Access point exists in--------------
A. Transport layer
B. Application layer
C. Network layer
D. Data link layer
14. Which multiple access technique is used by IEEE 802.11 standard for wireless
LAN
A. CSMA/CA
B. CDMA
C. EVDO
D. ALOHA
15. Which device performs the function of determining the path that messages
should take through internetworks ?
A. A firewall
2
Prepared by Belayneh Tadele mob. 0921777735
Hardware and Networking Service Model COC level IV 2015

B. Router
C. A DSL modem
D. A web server
16. Which protocol is used by the traceroute command to send and receive echo-
requests and echo-replies?
A. SNMP
B. Telnet
C. TCP
D. ICMP
17. Enabling additional users to handle administrative tasks for a particular objects
is referred to as:
A. Assignment
B. Targeting
C. Delegation
D. Redirection
18. A leadership style in which the leader includes one or more employees in the
decision making process is?
A. Authoritarian or autocratic
B. Federalist
C. Participative or democratic
D. Delegate or free reign
19. Local GPO settings are stored in what folder on a computer?
A. %systemroot%/system/Group policy
B. %systemroot%/system32/Drivers/Etc/Group policy
C. %systemroot%/system32/Drivers/Group policy
D. %systemroot%/system32/Group policy
20. Dawit is fetching mails from a server lying at a remote location. Which protocol is
he using to fetch the mails?
A. S/MIME
B. POP3
C. SMTP
D.HTTP
21. Refer to the exhibit bellow. As an administrator pings the default gateway at
10.10.10.1 and output as shown. At which OSI layer is the problem?
C:\> Ping 10.10.10.1
Pinging 10.10.10.1 with 32 bytes of data
Request time out.
Request time out.
Request time out.
Request time out.
Ping statistics for 10.10.10.1:
Packets sent-4, received=0,lost-4(100%loss)
A. Session layer
B. Application layer
C. Data link layer
D. Network layer
3
Prepared by Belayneh Tadele mob. 0921777735
Hardware and Networking Service Model COC level IV 2015

22. Which of the following statement about a wireless LAN controller is true?
A. They rely on external firewalls for WLAN security
B. They can simplify the management and deployment of wireless
LANS
C. They must be configured through a GUI over HTTP or HTTPS
D. They are best suited to smaller wireless networks
23. Users are complaining that they are unable to browse certain websites on the
internet. An administrator can successfully ping a web server via its IP address,
but cannot browse to the domain name of the website. which troubleshooting
tool would be most useful in determining where the problem is?
A. Netstat
B. Tracert
C. Nslookup
D. Ipconfig
24. Of the following is a principle of the total quality management?
A. Continuous productivity improvement
B. Continuous value enhancement
C. Continuous process improvement
D. Continuous defect elimination
25. A network administrator is implementing a policy that requires strong, complex
passwords. Which data protection goal does this policy support ?
A. Data integrity
B. Data quality
C. Data redundancy
D. Data confidentiality
26. A network administrator is verifying the configuration of a newly installation
establishing a FTP connection to a remote server, what is the highest protocol
stack that the network administrator is using for this operation?
A. Application
B. Session
C. Transport
D. Presentation
27. You want to implement a mechanism that automates the IP configuration,
including IP address, subnet mask, default getaway, and DNS information. Which
protocol will use to accomplish this?
A. SMTP
B. DHCP
C. ARP
D. SNMP
28. How many host addresses are available on the network 172.16.128.0 with a
subnet mask of 255.255.252.0? (bonus question)
A. Cut-through
B. Fast-forward
C. Fragment-free
D. Store-and-forward
4
Prepared by Belayneh Tadele mob. 0921777735
Hardware and Networking Service Model COC level IV 2015

29. You are an enterprise administrator for IIHT consists of a single active directory
forest called IIHT.com. the IIHT.com forest contains six domains under it. ALL
DNS servers in the forest run windows server 2008. Which of the following
actions would you choose to ensure that all public DNS queries are channeled
through a single –caching – only DNS server?
A. Configure a global names host record for the hostname of the
caching DNS.
B. Configure the root hints.
C. Enable BIND secondary’s on a DNS server.
D. Record for the hostname of the caching DNS server.
30. Which connectivity method would be best for a corporate employee who works
from home two days a week, but needs secure access to internet corporate
databases?
A. WiMAX
B. Cable
C. DSL
D. VPN
31. Which of the following servers services use TCP----------------------------------
1. DHCP
2. SMTP
3. HTTP
4. TFTP
5. FTP
A. 1 and 2
B. 2,3 and 5
C. 1,2 and 4
D. 1,3 and 4
32. What is the access point (AP) in a wireless LAN?
A. All the nodes in the network
B. A wired devices that connect the wired network with a node
C. Wireless devices itself
D. Device that allows wireless devices to connect to a wired
network
33. Which of the following is best describe virtual memory?
A. The use of hard disk space as an extension of RAM when
physical memory runs out
B. A memory which used to hold data in permanent bases
C. A segment of memory that has been reserved for use by the CPU
D. An extremely fast of memory
34. The time required to examine the packets header and determine where to direct
the packets is part of
A. POP UP delay

B . Transmission delay

B. Queuing delay

5
Prepared by Belayneh Tadele mob. 0921777735
Hardware and Networking Service Model COC level IV 2015

C. Processing delay
35. ---------------------- is the process that helps managers understand the nature of the
industry, the way firms behave competitively within the industry , and how
competition is generally undertaken
A. Portfolio analysis
B. Market needs analysis
C. Strategic market analysis
D. Organizational analysis
36. The scheduled activities are based on a preset schedule that is established
regardless of need V2 repetition q3
A. Predictive maintenance
B. Interval based maintenance
C. Rehabilitation maintenance
D. Reliability-centered maintenance
37. ------------------is the signal sent from a TV station to your TV
A. Full duplex
B. Simplex
C. Multiplex
D. Half duplex
38. A back up types , which includes only those files that have been modified since the
last backup and clears the archive bit of the files it copies to the backup medium
A. Daily backup
B. Full backup
C. Incremental backup
D. Copy backup
39. What is the advantage of using SSH over Telnet?
A. SSH operates faster than Telnet
B. SSH supports authentication for a connection request
C. SSH is easier to use
D. SSH provides secure communications to access hosts
40. The network design for a college with users at five sites is being developed where
in the campus network architecture would servers used by all users be located
A. Access-distribution
B. Enterprise edge
C. Data center
D. Services
41. Which class of a network is used for experimental testing?
A. Class D
B. Class B
C. Class A
D. Class E
42. A protocol which deals with resolving domain names is---------------
A. SMTP
B. POP3
C. DHCP
D. DNS
6
Prepared by Belayneh Tadele mob. 0921777735
Hardware and Networking Service Model COC level IV 2015

43. One of the following can explain mentoring


A. Daily weekly and monthly transaction and reports
B. Departmental budgets development
C. Sales performance development
D. Professional and personal development
44. Microsoft windows server 2008 uses the windows installer with group policy to
install and manage software that is packaged into what type of file
A. In
B. Mse
C. Msi
D. Exe
45. Which one of the following is the quality of employee’s work ethics?
A. Unconsciousness
B. Aggressiveness
C. Analytical skills
D. Maliciousness

46. The DOD model (also called the TCP/IP stack) has four layers which layer of the
DOD model is equivalent to the network layer of the OSI model?
A. Host –to-host
B. Internet
C. Network access
D. Application
47. One source sending a packet to multiple destinations-----------------------------------
A. Domain server
B. Broadcasting
C. Unicasting
D. Multicasting
48. What is wired equivalent privacy (WEP)?
A. Security algorithm for wireless networks
B. Security algorithm for flash drive communication
C. Security algorithm for Ethernet
D. Security algorithm for usb communication
49. Which statements are true regarding ICMP packets?
A. ICMP guarantees , datagram delivery
B. ICMP is encapsulated within UDP datagram
C. ICMP is unencapsulated within IP datagram
D. ICMP can provide hosts with information about network problems
50. When a manager monitors the work performance of workers in his department
to determine if the quality of their work is up to standard this managers is
engaging in which function
A. Controlling
B. Planning
C. Leading
D. Organizing

7
Prepared by Belayneh Tadele mob. 0921777735
Hardware and Networking Service Model COC level IV 2015

51. Your network consists of an active directory forest that contains one domain
named contoso.com all domain controllers run windows server 2008 and are
configured as DNS servers . you have two active directory integrated zones.
Contoso.com and nwtraders.com you need to ensure user is able to modify
records in the contoso.com zone. You must prevent the user from modifying the
SOA record in the nwtraders.com zone. What should you do?
A. From the DNS manager console, modify the permissions of the
nwtraders.com zone
B. From active directory users and computers console, modify the
permissions of the domain controllers organizational unit (OU)
C. From the DNS managers console, modify the permissions of the
contoso.com zone
D. From the active directory users and computers console, run the
delegation of control wizard
52. It allows a visited website to store its own information about a user on the user’s
computer—
A. Cookies
B. Spam
C. Malware
D. Adware
53. A corporate network includes an active directory domain services (AD DS) forest
that contains two domains. All servers run windows server2008 R2. All domains
controller are configured as DNS server. Standard primary zone for.contoso.com
its stored on a member server .you need to ensure that all domains controllers
can resolve names from the dev.contoso.com zone what should You do?
A. On one domain controller, create a stub zone. Configured the stub zone
to replicate to all DNS servers in the forest.
B. On the member server, create a secondary zone.
C. On one domain controller, create a conditional forwarder configure to
replicate to all DNS servers in the domain.
D. On one domain controller, create a stub zone configured the stun zone
to replicate to all DNS servers in the domain.
54. Which statements are true regarding ICMP packets?
1. They acknowledge receipt of a TCP segment
2. They guarantee datagram delivery
3. They can provide hosts with information about network problems
4. They can encapsulated within IP datagram
A. 2 and 1
B. 3 and 4
C. 1 only
D. 2,3 and 4
55. A new corporation needs a data network that must meet certain requirements.
The network must provide a low cost connection to sales people dispersed over a
large geographical area. Which type of WAN infrastructure would meet the
requirements?
A. Public infrastructure
8
Prepared by Belayneh Tadele mob. 0921777735
Hardware and Networking Service Model COC level IV 2015

B. Private infrastructure
C. Dedicated
D. Satellite
56. Which of the following statement about a group is true?
A. You need five or more people to be considered a work group
B. The definition of groups suggest that a group is two or more people
together for any reason
C. Formal groups are aimed at specific social agendas
D. Groups should be formal
57. DHCP uses UDP port number -------------------- for sending data to the server
A. 67
B. 68
C. 66
D. 69
58. What process involves placing one PDU inside of another PDU?
A. Encapsulation
B. Encoding
C. Segmentation
D. Flow control
59. You work as a senor office 365 administrator a ABC.com. the ABC.com network
consists of a single domain named ABC.com you are running a training exercise
for junior administrator you are currently discussing office 365 admin role.
Which of the following roles have extended roles in Microsoft exchange online?
A. The bailing admin role
B. The user management admin role
C. The service admin role
D. The password admin role
60. Which area of the network would a college IT staff most likely have to redesign as
a direct result of many students bringing their own tablets and smart phones to
school to access school resources?
A. Extranet
B. Intranet
C. Wireless LAN
D. Wired LAN
61. Router access switches, hub and word processing operate at -------, ---------, ---------
and -------- layer respectively?
A. 3,3,1,7
B. 3,2,1,7
C. 3,3,2 none
62. The willingness to exert high levels of effort to reach organizational goals based
on the efforts ability to satisfy some individual need is ----------------------
A. Motivation
B. Leadership
C. Need configuration
D. Effort management

9
Prepared by Belayneh Tadele mob. 0921777735
Hardware and Networking Service Model COC level IV 2015

63. What is an ISP?


A. A standard body that develops cabling and wiring standard for networking
B. A networking device that combines the functionality of several different
networking devices
C. An organization that enables individuals and businesses to connect to the
internet
D. A protocol that establishes how computers within a local network
communicate
64. Which of the following is the valid host range for the subnet on which the IP
address 192.168.168.188. 255.255.255.192 resides?
A. 192.168.168.128-190
B. 192.168.168.129-191
C. 195.168.168.128-192
D. 192.168.168.129-190
65. Service that are required to enable another service to run are referred to as
service--------
A. Dependencies
B. Roots
C. Parent
D. Prerequisites
66. What are the characteristics of a scalable network?
A. Suitable for modular devices that allow for expansion
B. Grows in size with the impacting of existing users
C. Easily overloaded with increased traffic
D. Offers limited number of application

67. To back up active directory you must install what feature from the server
manager console?
A. Windows server backup
B. Active directory backup client
C. Windows backup utility
D. Backup exec 1
68. What is the function of a router?
A. It manages the VLAN database
B. It connects multiple IP networks
C. It controls the flow of data via the use of layer 2 addresses
D. It increases the size of the broadcast domain
69. In wireless distribution system
A. Multiple access point are inter-connected with each other
B. There is no access point
C. Only one access point exists
D. Only one wired access point
70. The bit length for IPV6 address ----------------
A. 32 bits
B. 128 bites

10
Prepared by Belayneh Tadele mob. 0921777735
Hardware and Networking Service Model COC level IV 2015

C. 192 bites
D. 64 bites
71. You are an enterprise administrator for IIHT the corporate network of IIHT
consists of a DHCP server that runs windows server 2008 which of the following
options choose to reduce the size of the DHCP database?
A. Enable the compress contents to save disk space attribute of the dhcp.mdb
file, from the properties of dhcp.mdb file.
B. Reconcile the database from the DHCP snap-in.
C. Run jetpack exe dhcp.mdb temp.mdb from the folder that contains the
DHCP.
D. Enable the file is ready for archiving attribute of the dhcp.mdb file, from
the properties of dhcp.mdb file.
72. Your network contains an active directory domain named contoso.com. the
domain contains a domain controller named DC1. You have a member server
named server 1. Both DC1 and server 1 have the DNS server role installed on DC1,
you create an active directory integrated zone named adatum.com. you need to
ensure that server 1 receives a copy of the zone.
A. Create secondary one on server 1
B. Modify the zone type of adatum.com
C. Modify the zone transfers settings of adatum.com
D. Add server 1 to the DNS update proxy group
73. Which of the following is true of effective communication?
A. Always translate the message in to benefits for our self than the other
party
B. Not recognize that actions speak louder than words
C. Be unconsciousness for personal benefit
D. Organize your thoughts
74. What security violation would cause the most amount of damage to the life of a
home user?
A. Capturing of personal data that leads to identify theft
B. Spyware that leads to spam emails
C. Replication of worms and viruses in your computer
D. Denial of service to your email server
75. A web cookie is a small piece of data?
A. Sent from user to all servers
B. Sent from root server to all servers
C. Sent from user and stored in the server while a user is browsing a website
D. Sent from a website and stored in user’s web browser while a user is
browsing a website
76. A type of cabling used to connect a router to a computer using console serial port
A. SFP
B. Straight through
C. Roll over
D. Cross over
77. What type of network traffic requires QOS?
A. Video conferencing
11
Prepared by Belayneh Tadele mob. 0921777735
Hardware and Networking Service Model COC level IV 2015

B. Wiki
C. On-line purchasing
D. Email
78. If the server NO clue about where to find the address for hostnames then?
A. Request is not processed
B. Server asks to root server
C. Server asks to its adjusting server
D. Server not reply for the request
79. During a routine inspection a technician discovered that software that was
installed on a computer was security collecting data about websites that were
visited by users of the computer. Which type of threat is affecting this computer?
A. Zero-day attack
B. Identify theft
C. Spyware
D. Dos attack
80. A network administrator needs to expand a network at ABC corporate office,
which is quickly growing you are instructed to enlarge the area which one of the
following is layer 1 devices that you can use?
A. Router
B. Hub
C. Switch
D. Network adapter card

12
Prepared by Belayneh Tadele mob. 0921777735

You might also like